Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
Infocus: Unix (Page 2 of 12)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Solaris 10 Security
This article discusses the many new security features in Sun's Solaris 10 operating system, as well as Sun's holistic approach to security.
By: Ravi Iyer 2004-04-19
http://www.securityfocus.com/infocus/1776

Dogs of War: Securing Microsoft Groupware Environments with Unix (Part 2)
This article discusses the implementation of layered mail security using Unix as an MTA in front of Microsoft groupware products. Part two describes the use of Qmail, Qmail-Scanner, Clam AntiVirus and SpamAssassin.
By: Bob Rudis 2004-04-05
http://www.securityfocus.com/infocus/1772

Dogs of War: Securing Microsoft Groupware Environments with Unix (Part One)
This article discusses the implementation of layered mail security using Unix as MTA in front of Microsoft groupware products. Part one describes the use of Sendmail, MIMEDefang and SpamAssassin.
By: Bob Rudis 2004-03-26
http://www.securityfocus.com/infocus/1770

Oracle Row Level Security: Part 2
This paper explores the row level security feature added to Oracle 8i and above, and provides examples. One of the main uses of row level security is to allow all of a company's data to be stored in one database for different departments, or for a hosting company to store data for different companies in one database. Part Two.
By: Pete Finnigan 2003-11-17
http://www.securityfocus.com/infocus/1744

Oracle Row Level Security: Part 1
This paper explores the row level security feature added to Oracle 8i and above, and provides examples. One of the main uses of row level security is to allow all of a company's data to be stored in one database for different departments, or for a hosting company to store data for different companies in one database. Part One.
By: Pete Finnigan 2003-11-07
http://www.securityfocus.com/infocus/1743

Web Security Appliance With Apache and mod_security
This article will demonstrate how you can build your own application gateway with little effort, using open source components that are widely available.
By: Ivan Ristic 2003-10-21
http://www.securityfocus.com/infocus/1739

Securing MySQL: step-by-step
This article describes the basic steps which should be performed in order to secure a MySQL database against both local and remote attacks.
By: Artur Maj 2003-08-28
http://www.securityfocus.com/infocus/1726

Detecting SQL Injection in Oracle
This paper takes the subject of SQL injection further and investigates the possibilities for the Oracle Database Administrator to detect SQL injection in the wild.
By: Pete Finnigan 2003-07-22
http://www.securityfocus.com/infocus/1714

Securing PHP: Step-by-Step
This article shows the basic steps in securing PHP, one of the most popular scripting languages used to create dynamic web pages on the Internet.
By: Artur Maj 2003-06-23
http://www.securityfocus.com/infocus/1706

Securing Apache: Step-by-Step
This article shows in a step-by-step fashion, how to install and configure the Apache 1.3.x Web server in order to mitigate or avoid successful break-in when new vulnerabilities in this software are found.
By: Artur Maj 2003-05-14
http://www.securityfocus.com/infocus/1694

Unix (Page 2 of 12)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >







 

Privacy Statement
Copyright 2005, SecurityFocus